Sciweavers

440 search results - page 56 / 88
» Intrusion Detection: A Bioinformatics Approach
Sort
View
IEEEPACT
2007
IEEE
14 years 5 months ago
JudoSTM: A Dynamic Binary-Rewriting Approach to Software Transactional Memory
With the advent of chip-multiprocessors, we are faced with the challenge of parallelizing performance-critical software. Transactional memory (TM) has emerged as a promising progr...
Marek Olszewski, Jeremy Cutler, J. Gregory Steffan
SAC
2010
ACM
14 years 5 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
FPGA
2004
ACM
163views FPGA» more  FPGA 2004»
14 years 2 months ago
Time and area efficient pattern matching on FPGAs
Pattern matching for network security and intrusion detection demands exceptionally high performance. Much work has been done in this field, and yet there is still significant roo...
Zachary K. Baker, Viktor K. Prasanna
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
14 years 3 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
ISBRA
2009
Springer
14 years 5 months ago
Analysis of Cis-Regulatory Motifs in Cassette Exons by Incorporating Exon Skipping Rates
Identification of cis-regulatory motifs has long been a hotspot in the study of alternative splicing. We propose a two-step approach: we first identify k-mer seed motifs by testing...
Sihui Zhao, Jihye Kim, Steffen Heber